Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
NightSpire | No | 2026-04-28T07:25:24 |
nspireyzmvapgiwgtuoznlafqvlyz7ey6himtgn5bdvdcowfyto3yryd.onion
|
|||
|
|
NightSpire | No | 2026-05-14T07:39:30 |
a2lyiiaq4n74tlgz4fk3ft4akolapfrzk772dk24iq32cznjsmzpanqd.onion
|
|||
|
|
Database | NightSpire | No | 2026-04-28T07:27:56 |
nspirebcv4sy3yydtaercuut34hwc4fsxqqv4b4ye4xmo6qp3vxhulqd.onion
|
|||
|
|
Database | NightSpire | No | 2026-04-28T07:30:28 |
nspiremkiq44zcxjbgvab4mdedyh2pzj5kzbmvftcugq3mczx3dqogid.onion
|
|||
|
|
Verify human - NightSpire | Yes | 2026-05-14T07:38:28 | nginx |
nspire7lugml7ybqyjaaxtsgrs4qn3fcon3lrjbih6wamttvdm5ke4qd.onion
|
||
|
|
RaaS Service Started | Yes | 2026-05-14T07:37:52 | nginx |
nspirep7orjq73k2x2fwh2mxgh74vm2now6cdbnnxjk2f5wn34bmdxad.onion
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
Everything.exe
|
|
|
|
|
|
|
MEGA
WinSCP
|
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact | Resource Development |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Valid Accounts | Command and Scripting Interpreter | Scheduled Task/Job | Exploitation for Privilege Escalation | Obfuscated Files or Information | OS Credential Dumping | Network Service Discovery | Remote Services: Remote Desktop Protocol | Automated Collection | Exfiltration Over C2 Channel | Application Layer Protocol | Data Encrypted for Impact | Develop Capabilities |
| Brute Force | Software Deployment Tools | Create Account | Masquerading | OS Credential Dumping: LSASS Memory | Process Discovery | Remote Services: SMB/Windows Admin Shares | Archive Collected Data | Exfiltration Over Alternative Protocol | Encrypted Channel | |||
| Exploit Public-Facing Application | Boot or Logon Autostart Execution | Indicator Removal | Unsecured Credentials | System Information Discovery | Windows Management Instrumentation | Archive Collected Data: Archive via Utility | Exfiltration Over Web Service: Exfiltration to Cloud Storage | |||||
| Phishing | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | System Binary Proxy Execution | File and Directory Discovery |